asp

Results 451 - 475 of 564Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 04, 2014
As new technology and connected consumers redefine how business is done, IBM Smarter Commerce solutions help companies more effectively engage with customers across four critical aspects, which include the Buy, Market, Sell and Service components. This ebook outlines those areas and solutions for each.
Tags : 
ibm, smarter commerce, buy process, buy solutions, redefining marketing, connected consumers, market solutions, sales success
    
IBM
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent
    
Oracle
Published By: IBM     Published Date: Jan 09, 2014
While some organizations are already utilizing Big Data or various large enterprise analytics techniques, many more are still working to grasp how these new usage models might help them. There’s a lot of undiscovered value in the vast amounts of data they currently have and the data that they can get from other sources. They know that they can somehow convert this data into insights that will let them ramp up efficiency and be ready for tomorrow today.
Tags : 
big data, enterprise analytics, red hat, data analytics, powerlinux system, powervm virtualization
    
IBM
Published By: ServiceNow     Published Date: Nov 22, 2013
This white paper explores how SaaS has fundamentally changed the economics for ITSM by reducing or removing maintenance, internal resource, and infrastructure costs.
Tags : 
servicenow, enterprise it, saas economics, itsm project, internal resource, infrastructure costs, service automation, software maintenance
    
ServiceNow
Published By: Sage     Published Date: Oct 17, 2013
See why an appropriate time and attendance system that meets your organization’s needs can help to eliminate and prevent most of the negative aspects of inaccurate and unreliable timekeeping for your business.
Tags : 
employee productivity, workforce management, company culture, employee performance
    
Sage
Published By: GoToMeeting     Published Date: Oct 08, 2013
Are you an Extreme Leader? Do you aspire to be one? The Extreme Leader doesn't just meet the existing standards; she or he defines higher ones. This handbook draws upon lessons from The Radical Leap Re-Energized by leadership expert Steve Farber, offering tips for taking your leadership to the next level.
Tags : 
yankee group, pim bilderbeek, leadership, daily, handbook, productivity, communication, collaboration
    
GoToMeeting
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
Arbor
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules
    
ActiveProspect, Inc.
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules
    
ActiveProspect, Inc.
Published By: Webroot     Published Date: Sep 18, 2013
In today’s challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing. PassMark Software is a leading authority in software and hardware performance benchmarking, providing independent testing and analysis. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics—from performance to malware protection—to help you determine which would work best in your organization
Tags : 
security, benchmark, software, hardware, endpoint security, performance metrics, protection
    
Webroot
Published By: IBM     Published Date: Sep 11, 2013
Learn how a better grasp of "big data" from consumers will help retailers generate valuable insights for personalizing marketing and improving the effectiveness of campaigns among other things.
Tags : 
big data, retail, insights, marketing, campaigns, velocity of data
    
IBM
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
Microsoft has announced that it will end active support and “end of life” Windows XP on April 8, 2014. Now, as that date fast approaches, the highly negative consequences of continuing to use Windows XP in enterprise environments are becoming much clearer. After that date, IT security risks and compliance issues from continued use will be magnified. This white paper examines three aspects that can potentially create a “nightmare” for your organization.
Tags : 
windows xp, compliance, risk, windows upgrade, enterprise, end-user computing
    
Lenovo and Microsoft
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
    
Red Hat
Published By: Switch Video     Published Date: Jun 05, 2013
When explaining your company’s value proposition, starting with why is always better than starting with how. Learn how an explainer video using emotional and aspirational messaging was able to not only increase Rypple’s online conversion rate by 20%, but also generated more qualified and engaged leads.
Tags : 
explainer video, animated video, whiteboard video, conversion rate, landing page conversion rate, marketing video, video marketing, online video marketing
    
Switch Video
Published By: Hubspot     Published Date: Apr 23, 2013
It's a big job, for sure, but one your agency can handle with the right skill set. This 70+ page ebook covers all the crucial aspects of online branding, and will help your agency build out new or refine existing branding services.
Tags : 
inbound marketing, brand management, value proposition, buyer personas, social presence
    
Hubspot
Published By: Silverpop     Published Date: Mar 07, 2013
It seems as if mobile email has become the new hot topic among digital marketers. While email itself is full of important questions to as, this is only one aspect of an effective multi-screen email marketing strategy. Watch this video to learn more.
Tags : 
mobile email, mobile email marketing, digital marketing, email marketing strategy, emerging marketing
    
Silverpop
Published By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper to learn the key aspects of today’s realistic application whitelisting technologies.
Tags : 
whitelisting, security, application control, cyber attacks, blacklist
    
Bit9
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : 
tcpa compliance, telephone consumer protection act, compliance, interactive intelligence
    
Interactive Intelligence
Published By: McAfee     Published Date: Feb 06, 2013
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
Tags : 
security management platform, siem, log management, security management 2.0
    
McAfee
Published By: HP     Published Date: Jan 18, 2013
This white paper show why it is important to pay proper attention to all aspects of people, processes, tools, and knowledge, as well as the technology needed to get value from virtualization. It gives examples of how mature processes can create value
Tags : 
infrastructure limits, processes, tools, knowledge, technology value, virtualization, creating value
    
HP
Published By: Rapid7     Published Date: Nov 27, 2012
What's your security protection factor (SPF)? In this on demand webcast for IT and security professionals, Rapid7's CSO and Chief Architect of Metasploit, HD Moore, shows how you can reduce your remediation workload by testing which vulnerabilities really matter.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: HP - Intel®     Published Date: Oct 19, 2012
Many admit to being confused by the hype and haze surrounding cloud computing. This white paper aspires to separate fact from fiction, reality from myth, and, in doing so, aid senior IT executives as they make decisions around cloud computing.
Tags : 
    
HP - Intel®
Published By: Business.com     Published Date: Oct 09, 2012
The Internet has commoditized virtually every aspect of business, offering individuals, businesses and consumers any information imaginable with the touch of a few buttons.
Tags : 
business, recruiting software, human resources, software
    
Business.com
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.